Description: Network Configuration Manager contained a vulnerability through which it was possible to upload files using an unauthenticated servlet. This was identified and disclosed by Digital Defense, a provider of security risk assessment solutions. For details, please refer to the public disclosure published on January 30th.
Severity: Very high.
Affected users: Network Configuration Manager customers using version 123055 or earlier.
Background: Digital Defense responsibly disclosed the vulnerability to ManageEngine in November of 2017. Shortly afterwards, our security and development teams touched base with Digital Defense to gather more information. We accord the highest priority to fixing vulnerabilities, and this particular vulnerability was addressed on January 2nd with an update to Network Configuration Manager (123057). Customers using this version and above already have protection from the disclosed vulnerability.
Next step: Download the upgrade pack from https://www.manageengine.com/network-configuration-manager/upgradepack.html
and immediately upgrade to the latest version (123057). Please read the upgrade instructions carefully before beginning the upgrade. For assistance, write to ncm-support@manageengine.com or call us toll-free at +1.888.720.9500.
Important note: As always, make a copy of the entire Network Configuration Manager installation folder before applying the upgrade and keep the copy in a separate location. If anything goes wrong during the upgrade, you'll have this copy as a backup, which will keep all your settings intact. If you're using a MS SQL server as a back-end database, back up the Network Configuration Manager database before upgrading. Once the upgrade is successfully completed, remember to delete the backup.
We offer our sincerest apologies for any inconvenience this may have caused.